Open and Safe HIT Platforms [PDF]

Total Page:16

File Type:pdf, Size:1020Kb

Open and Safe HIT Platforms [PDF] Open and Safe HIT Platforms How much do you really want a HIT platform to be like an iPhone? Authors • Ben Adida Published Creative Commons Attribution 3.0 License Version 12 Last edited: Sep 21, 2009 Exported: Aug 16, 2012 Original URL: http://knol.google.com/k/-/-/37idooo44z8da/1 Introduction Kohane and Mandl [1] argue that health information technology should follow the iPhone example and move towards a platform architecture with substitutability, i.e. modular components that can be substituted for others, with the user as the ultimate decider. The iPhone analogy is particularly powerful, because the broad strokes of such a platform are immediately clear to millions of existing users – and millions of others who have at least seen an iPhone television commercial declaring "there's an app for that!": if you don't like one app for job X, just download another app that does job X better. However, Fred Trotter argues that the iPhone analogy is poor [2], because Apple: • plays favorites with advance access to hidden APIs • approves applications using an inscrutable process • forbids applications that duplicate core functionality, e.g. phone/SMS. • is the sole source of approved applications Kohane, Mandl et al. followed "No Small Change" with the "Ten Principles" [3]. Interestingly, most of the design principles they recommend directly conflict with Apple's regulation of the iPhone ecosystem, almost exactly as detailed by Trotter, in particular: Principle #4 states that "Third-party vendors should be able to develop [...] without barriers." This conflicts with the iPhone's strict and unpredictable approval process, and Apple's apparent decision to play favorites with some applications. Principle #5 states that "platform vendors should not have control over what is installed on the platform. " This conflicts with Apple having sole control over which applications are allowed into the ecosystem, since even corporations who use the iPhone in a business setting are limited to applications Apple approves. Principle #8 states that "All applications should be removable and none should be required." This conflicts with Apple's stated intent to reject applications which duplicate built-in functionality, like SMS and VOIP. Principle #10 states that "Certification requirements [...] should be kept minimal to maximize substitutability." This conflicts with Apple's practice of rejecting applications for subjective reasons, such as the use of "confusing icons." Open-Source as the Solution? Some have suggested that other platforms like Android are more compatible with the Ten Principles [4], because the Android platform is open-source, and Android phones typically allow users to install applications of their own choosing. Open-source, however, does not guarantee compatibility with the ten principles: a phone vendor could easily sell Android-enabled phones where only approved applications are installable, and where the phone's operating system, though open-source, cannot be physically updated on the phone without vendor approval, e.g. using digital signatures to approve software updates. A Platform can be "too open." Platform designers and operators seek, for various reasons, some amount of control over the direction of the ecosystem they foster. When announcing third-party application support for the iPhone, Steve Jobs wrote [5]: "It will take until February to release an SDK because we're trying to do two diametrically opposed things at once: provide an advanced and open platform to developers while at the same time protect iPhone users from viruses, malware, privacy attacks, etc. This is no easy task." Though it is clear that Apple's regulation of the iPhone apps market has gone far beyond malware prevention, the goal of malware prevention is certainly reasonable. An iPhone that can no longer receive calls because an application misbehaves would significantly reduce the functionality of the device and justifiably tarnish Apple's reputation. More generally, an application ecosystem that doesn't provide some basic measure of safety would slow innovation and cast a doubt on extensibility in general, as users would shy away from installing applications. This inherent conflict between openness and safety will inevitably play out in the health IT space, especially as the importance of Personally Controlled Health Records grows and end-users are involved in the application selection process. A key question is whether we can overcome the unproductive deadlock of extreme measures on either side: neither closed platforms that stifle innovation, nor fully anarchic platforms that provide no safety guarantees are likely the right answer. A balanced approach for PCHRs: Open/Branded/Trademarked One approach worth serious consideration, especially in the tricky PCHR space, is the "Open Software / Branded Platform / Trademarked Interoperability" model. In this model, the core software, e.g. Indivo, is open-source, and multiple installations are deployed by independent organizations (Children's Hospital Boston, Dossia, ...) Because the core software is shared between these installations, the platform API remains relatively consistent, and applications built for one installation are easily ported to another. This constitutes the "Open Software" portion of the model. Then, individual platform deployments can design their customized safety conditions. Children's Hospital Boston may be particularly conservative with the applications it enables within its ecosystem, given that most patients are minors with complex privacy constraints. On the other hand, a commercial Indivo installation targeted at adults with serious medical conditions might choose to be far more permissive in its list of acceptable applications, given that sick adults tend to focus on care before privacy. Users of each installation would immediately know which organization they are dealing with, given that each installation is branded by the deploying organization. Thus, each installation puts its brand at stake when it bans or promotes a particular application. This is the "Branded Platform" portion of the model, where end-users come to trust particular PCHR deployments based on their ecosystem policies. Finally, users must have the ability to migrate from one platform deployment to another when they decide they would prefer to live under a different safety regime, either more or less permissive. To ensure that all platform deployments respect the user's decision to migrate his record, each deployment would be required to pass a battery of compatibility tests to be branded "API compatible" with the core release. This requirement would be expressed in the API's trademark, e.g. the Indivo trademark for some PCHRs: only those deployments that remain compatible with key portions of the Indivo API would be legally permitted to call themselves "Indivo compatible." Users would then instantly recognize the set of PCHRs which clearly enable migration from one PCHR deployment to another. This is, of course, the "Trademarked Interoperability" portion of the model. The Open/Branded/Trademarked model is designed to provide the right incentives for interoperability and user choice, balanced with patient safety, in the PCHR market. Specifically: • if the open-source project deviates from its core mission, a separate team can fork the code • if existing deployments do not provide the range of features and safety regimes that some users seek, then anyone can create a new PCHR deployment using the open-source code • if some deployments attempt to entrap users by allowing migration in, but not migration out, these deployments would be in violation of the core project API's trademark Conclusion We do not claim that this model is the only viable approach: other models may well balance these competing interests. It is clear, though, that when balancing innovation and safety in a distributed application environment, a single feature, such as open-source, doesn't capture the complexity. Some level of compatibility enforcement is likely needed, so that not just code, but also data, can be ported. It will be interesting and important to imagine how closed-source systems can play a role in balanced ecosystems. It will also be crucial to determine how much of this balance is required in enterprise environments, where increased control by local administrators is expected. References 1. Mandl KD, Kohane IS. No small change for the health information economy. N Engl J Med. 2009 Mar 26;360(13):1278-81. PubMed PMID: 19321867. 2. The iphone, a poor HIT platform analogy 3. Ten Principles for Fostering Development of an “iPhone-like" Platform for Healthcare Information Technology 4. Ten Principles for Fostering Development of Platform for Healthcare Information Technology 5. Steve Jobs Announces 3rd Party SDK for iPhone for February 2008 .
Recommended publications
  • Modern Competences on the International Labor Market
    Associate Professor Adam Jabło ński Head of Scientific Institute of Management WSB University in Pozna ń, Faculty in Chorzów, POLAND 6th International Week 3rd to 7th June 2019 in Viana do Castelo, Portugal ERASMUS+ training opportunities for students: a gateway to the International Labor Market Adam Jabło ński is an Associate Professor in WSB University in Poznan Faculty in Chorzow, e-mail: [email protected] . He is also President of the Board of a reputable management consulting company “OTTIMA plus” Ltd. of Katowice , and Vice-President of the “Southern Railway Cluster” Association of Katowice , which supports development in railway transport and the transfer of innovation, as well as cooperation with European railway clusters (as a member of the European Railway Clusters Initiative). He holds a postdoctoral degree in Economic Sciences , specializing in Management Science . Having worked as a management consultant since 1997, he has broadened his experience and expertise through co-operation with a number of leading companies in Poland and abroad. Adam Jabło ński is the author of a variety of studies and business analyses on business models, value management, risk management, the balanced scorecard and corporate social responsibility. He has also written and co-written several monographs and over 100 scientific articles in the field of management. Adam’s academic interests focus on the issues of modern and efficient business model design, including Sustainable Business Models and the principles of company value building strategy that includes the rules of Corporate Social Responsibility. Plan of Presentation: 1. Introduction to modern competences on the International Labor Market.
    [Show full text]
  • Artificial Intelligence, Big Data and Cloud Computing 144
    Digital Business and Electronic Digital Business Models StrategyCommerceProcess Instruments Strategy, Business Models and Technology Lecture Material Lecture Material Prof. Dr. Bernd W. Wirtz Chair for Information & Communication Management German University of Administrative Sciences Speyer Freiherr-vom-Stein-Straße 2 DE - 67346 Speyer- Email: [email protected] Prof. Dr. Bernd W. Wirtz Chair for Information & Communication Management German University of Administrative Sciences Speyer Freiherr-vom-Stein-Straße 2 DE - 67346 Speyer- Email: [email protected] © Bernd W. Wirtz | Digital Business and Electronic Commerce | May 2021 – Page 1 Table of Contents I Page Part I - Introduction 4 Chapter 1: Foundations of Digital Business 5 Chapter 2: Mobile Business 29 Chapter 3: Social Media Business 46 Chapter 4: Digital Government 68 Part II – Technology, Digital Markets and Digital Business Models 96 Chapter 5: Digital Business Technology and Regulation 97 Chapter 6: Internet of Things 127 Chapter 7: Artificial Intelligence, Big Data and Cloud Computing 144 Chapter 8: Digital Platforms, Sharing Economy and Crowd Strategies 170 Chapter 9: Digital Ecosystem, Disintermediation and Disruption 184 Chapter 10: Digital B2C Business Models 197 © Bernd W. Wirtz | Digital Business and Electronic Commerce | May 2021 – Page 2 Table of Contents II Page Chapter 11: Digital B2B Business Models 224 Part III – Digital Strategy, Digital Organization and E-commerce 239 Chapter 12: Digital Business Strategy 241 Chapter 13: Digital Transformation and Digital Organization 277 Chapter 14: Digital Marketing and Electronic Commerce 296 Chapter 15: Digital Procurement 342 Chapter 16: Digital Business Implementation 368 Part IV – Digital Case Studies 376 Chapter 17: Google/Alphabet Case Study 377 Chapter 18: Selected Digital Case Studies 392 Chapter 19: The Digital Future: A Brief Outlook 405 © Bernd W.
    [Show full text]
  • David Balto There Can Be Little Question That Internet Search Has
    Internet Search Competition: Where is the Beef? David Balto1 There can be little question that Internet search has revolutionized how we live, communicate, learn and engage in commerce. Internet search gives hundreds of millions of people access to a wealth of information heretofore unattainable. Barriers to information and communication have fallen as the Internet has become the great marketplace of ideas and commerce. Internet search must be organized as any information system. Search providers all have developed sophisticated algorithms to try to determine relevancy and order information in a timely fashion. Some firms have suggested that search is being misused as a competitive weapon. The target du jour is Google. Google‘s critics have crystallized allegations of anticompetitive conduct under the banner of ―Search Neutrality.‖2 While the allegations take many forms, they boil down to three complaints. First, it is alleged that Google has penalized certain types of websites in its search results rather than basing its results on some objective, universal concept of relevance (if there is such a thing). Second, Google‘s critics allege that Google unfairly favors its own content in its search results as part of its Universal Search. Lastly, Google‘s critics challenge Google‘s transparency with respect to its algorithm and ranking standards. The European Commission decided to give the Search Neutrality arguments more legs, as it announced on November 30, 2010 that it has opened a formal investigation of Google‘s business practices pertaining
    [Show full text]
  • Marketing Your Books Online Enhance Your Website, Easily and for Free
    Marketing Your Books Online Enhance your website, easily and for free Google Blogger What is it? A blog is a web journal that can be updated as often as you’d like. The most effective blog forms for presses tend to be publicity or news blogs, CEO or Publisher blogs, and author blogs. Where can I learn more? blogger.com (or do a Google search to find other free blogging tools) Google Calendar What is it? A public calendar that is easily added to your website and allows you to keep your readers abreast of readings and events. Where can I learn more? google.com/calendar Google Books for your site What is it? • Cobranded Search A search box for your homepage that searches the full text of all books you have in Google Books • Google Preview Individual book previews that can be embedded right into your website. Where can I learn more? Ask your Partner Manager for information on Cobranded Search and Google Preview. © Copyright 2009. Google is a trademark of Google Inc. All other company and product names may be trademarks of the respective companies with which they are associated. Marketing Your Books Online Drive readers to your website and books Google Books What is it? A powerful tool that displays books in response to regular Google queries. Your e-commerce site appears first among the “Buy this book” links, and because anyone with a website can embed book previews, your titles show up safely and securely all over the web. Where can I learn more? Ask your Partner Manager to fill you in on recent Google Books developments.
    [Show full text]
  • A Systematic Review of Food Insecurity Among US Students in Higher Education
    Journal of Hunger & Environmental Nutrition ISSN: 1932-0248 (Print) 1932-0256 (Online) Journal homepage: https://www.tandfonline.com/loi/when20 A systematic review of food insecurity among US students in higher education Aydin Nazmi, Suzanna Martinez, Ajani Byrd, Derrick Robinson, Stephanie Bianco, Jennifer Maguire, Rashida M. Crutchfield, Kelly Condron & Lorrene Ritchie To cite this article: Aydin Nazmi, Suzanna Martinez, Ajani Byrd, Derrick Robinson, Stephanie Bianco, Jennifer Maguire, Rashida M. Crutchfield, Kelly Condron & Lorrene Ritchie (2018): A systematic review of food insecurity among US students in higher education, Journal of Hunger & Environmental Nutrition, DOI: 10.1080/19320248.2018.1484316 To link to this article: https://doi.org/10.1080/19320248.2018.1484316 View supplementary material Published online: 22 Jun 2018. Submit your article to this journal Article views: 311 View Crossmark data Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=when20 JOURNAL OF HUNGER & ENVIRONMENTAL NUTRITION https://doi.org/10.1080/19320248.2018.1484316 A systematic review of food insecurity among US students in higher education Aydin Nazmia, Suzanna Martinez b, Ajani Byrdc, Derrick Robinsond, Stephanie Biancoe, Jennifer Maguiref, Rashida M. Crutchfieldg, Kelly Condrona, and Lorrene Ritchieh aFood Science and Nutrition Department, California Polytechnic State University, San Luis Obispo, USA; bNutrition Policy Insitute, University of California, Oakland, USA; cExtended
    [Show full text]
  • Total Mesorectal Excision Technique—Past, Present, and Future
    134 Total Mesorectal Excision Technique—Past, Present, and Future Joep Knol, MD1 Deborah S. Keller, MS, MD2 1 Department of Abdominal Surgery, Jessa Hospital, Hasselt, Belgium Address for correspondence Joep Knol, MD, Department of 2 Division of Colorectal Surgery, NewYork-Presbyterian/Columbia Abdominal Surgery, Jessa Hospital, Hasselt, Belgium University Medical Center, New York, New York (e-mail: [email protected]). Clin Colon Rectal Surg 2020;33:134–143. Abstract While the treatment of rectal cancer is multimodal, above all, a proper oncological resection is critical. The surgical management of rectal cancer has substantially evolved over the past 100years, and continues to progress as we seek the best treatment. Rectal cancer was historically an unsurvivable disease, with poor understanding of the embryological planes, lymphatic drainage, and lack of standardized technique. Major improvements in recurrence, survival, and quality of life have resulted from advances in preoperative staging, pathologic assessment, the development and timing of multi- modal therapies, and surgical technique. The most significant contribution in advanc- ing rectal cancer care may be the standardization and widespread implementation of total mesorectal excision (TME). The TME, popularized by Professor Heald in the early Keywords 1980s as a sharp, meticulous dissection of the tumor and mesorectum with all ► rectal cancer associated lymph nodes through the avascular embryologic plane, has shown universal ► total mesorectal reproducible reductions in local recurrence and improvement in disease-free and excision (TME) overall survival. Widespread education and training of surgeons worldwide in the TME ► transanal total have significantly impact outcomes for rectal cancer surgery, and the procedure has mesorectal excision become the gold standard for curative resection of rectal cancer.
    [Show full text]
  • Children's Bonding with Popular Youtube Vloggers and Their
    Children’s bonding with popular YouTube vloggers and their attitudes toward brand and product endorsements in vlogs: an explorative study Frans Folkvord, Kirsten Elizabeth Bevelander, Esther Rozendaal and Roel Hermans Abstract Frans Folkvord is based at Purpose – The purpose of this study has three primary aims. The first is to examine the amount of time the Tilburg School of children spend per week on viewing vlogs. Second, the authors explored children’s awareness and Humanities, Tilburg understanding of the brand or product placement in vlogs. Finally, the authors explored children’s self- University, Tilburg, The perceived susceptibility to the potential persuasive effects of these vlogs. Netherlands, and Open Design/methodology/approach – Self-reported measurements were assessed among children (N = Evidence Research, 127, 10-13 years of age). Barcelona, Spain. Findings – Results indicate that the majority of children frequently view vlogs and that their degree of bonding with the vlogger predicted the time spend on viewing vlogs. Children recalled products and Kirsten Elizabeth brands that were shown in vlogs, which were mostly food and beverages and considered themselves Bevelander and Esther and others affected by endorsements in vlogs. Rozendaal are both based Research limitations/implications – Only cross-sectional data were collected; these data cannot be at the Behavioral Science used to analyze behavior over a period of time or draw causal inferences. Institute, Radboud Practical implications – Considering the popularity of vlogs among young people, it is important to University, Nijmegen, The acquire more insight into the frequency and amount of time children spend on viewing vlogs and Netherlands. Roel Hermans children’s processing of persuasive messages in vlogs.
    [Show full text]
  • This Week in the Ctre
    VOLUME 1, ISSUE 1 THIS WEEK IN THE CTRE NOVEMBER 13—19, 2011 CHICAGO STATE UNIVERSITY UPCOMING TRAINING GOOGLE NINJAS IN THE CTRE! 11/15 On November 3-4, Theodis cally how Google and its “32 Ways to Use Google MOODLE NOON LIB 144 Garth and Rochelle John- many products can help Apps in the Classroom,” GRADEBOOK & son of the CTRE traveled to students learn, instructors highlighting such pro- 7:00PM ONLINE the Glacier Canyon Lodge in teach, and everyone to grams as Moderator, Wisconsin Dells to attend navigate the sea of apps SketchUp, and Knol. 11/17 MOODLE 11:00 the Google Sum- Stigliz was LIB 144 BASICS joined by 3 of & mit Midwest con- 7:00PM ference. her Google ONLINE peers at the For two days MOODLE 11/19 conference, GRADEBOOK 1:00PM straight, attendees who all came ONLINE talked, debated, to demonstrate MOODLE 11/20 and learned about how such time BASICS 3:00PM all things Google, ONLINE -tested applica- from Google Docs tions as Gmail to Picasa to the and Google Docs are still newly unveiled Chrome- that are available. evolving to allow for bet- SHOULD book. ter user experiences and CSU GO Julia Stigliz of Google’s The focus of the conference greater productivity. WITH Apps for Education team, was on education, specifi- AMBROSE? for example, presented on (continued on back) Let us know! Click here to look at HD VIDEO STREAMING AT CSU Ambrose Video’s list of programs, then A new HD video streaming Digital video streaming ser- and Discovery Education is send your thoughts— service may be coming to vice.
    [Show full text]
  • Chris Palma on Google Book Search at the Text & Academic Authors
    Chris Palma on Google Book Search at the Text & Academic Authors Association Annual Meeting 2008 M: I have the pleasure of introducing an old friend. I met him last year, and when you meet people at these conferences, they’re old friends immediately. Chris Palma, who you can see so you don’t need me to tell you, is the strategic partner/development manager of Google Book Search, and I’m going to make all of my introductions today err on the side of brevity because I think the best way of showing respect to speakers is not to talk a lot about them but just to let them talk. But I am just going to take one moment for one very egocentric part of this introduction to say that I had never heard of Google Book Search last year and I was absolutely fascinated by the presentation, and I immediately took charge of my life and sent my books to Google and waited for them to do the old-fashioned kind of scanning, a page at a time, with their machines, I guess, to get it in, figuring it’s better to ask forgiveness than permission, so I didn’t want to ask my publisher to do it, because what if they said no? And then we discovered later that the publisher, well, of course was going to do this and did it redundantly and was told the author already did it. And the really wonderful part of the egocentric story is when I go on their website and I check things, first of all, I see the many, many people who are looking, but also, more importantly to me, they make my book look so much better than it really is because the selling point of my book is it’s more visual than anything in the competition and every single one of the sample pages that they have to show you about my book is one of the most visual moments from the book.
    [Show full text]
  • The Challenges of 'Friending' China
    THE CHALLENGES OF ‘FRIENDING’ CHINA: Social Media Attempts to Scale the Great Firewall Kimberly Ryan General University Honors Capstone The Kogod School of Business Business Administration, Marketing Specialization and Interdisciplinary in International Corporate Practices Richard Linowes and Jen Oetzel Spring 2011 April 25, 2011 TABLE OF CONTENTS I. Executive Summary ………………………………………………………………….4 II. An Introduction to Social Media……………………………………………………4 a. History of Social Networking III. Facebook ……………………………………………………………………………...6 a. History b. Product c. Operations d. Finances IV. The Internet in China ………………………………………………………………..9 a. Foreign Investment b. Internet Censorship V. Social Media in China ………………………………………………………………11 a. History of Facebook in China b. Major Chinese Social Networks VI. Threats to Facebook’s Successful Operations in China ………………………….13 a. Local Competition ………………………………………………………………13 i. Renren 1. History 2. Product 3. Finances 4. Censorship b. Social Media Revolutions ……………………………………………………....17 i. Facebook’s Role in Egypt c. Compliance and Risks of Intellectual Property ………………………………19 i. The Case of Google in China ii. Lessons from Google in China for Facebook VII. Strategy Recommendation for Facebook ………………………………………….24 a. Concerns for Facebook as a Censored or an Isolated Network b. Capitalize on Developing Mobile Industry c. The China Mobile Market VIII. Conclusion …………………………………………………………………………..29 2 | P a g e IX. References …………………………………………………………………………...30 X. Appendices …………………………………………………………………………..33 a. Appendix A: History of Facebook Product Timeline b. Appendix B: Facebook Statistics and Accomplishments c. Appendix C: Facebook Organizational Structure d. Appendix D: Facebook Estimated Revenues e. Appendix E: Facebook Revenue per Unique User f. Appendix F: Chinese Networking Site Duplication g. Appendix G: World Map of Facebook’s Global Presence h. Appendix H: Chinese Social Media Equivalents i.
    [Show full text]
  • Debate on Antitrust Scrutiny of Google
    FROM: ACSBLOG DEBATE ON ANTITRUST SCRUTINY OF GOOGLE Benjamin G. Edelman† vs. Joshua D. Wright* GOOGLE’S DOMINANCE – AND WHAT TO DO ABOUT IT Benjamin G. Edelman he Senate Antitrust Subcommittee recently held a hearing1 to investigate persistent allegations of Google abusing its market power. Witnesses Jeff Katz (CEO of Nextag) and TJeremy Stoppelman (CEO of Yelp) demonstrated Google giving its own services an advantage other sites cannot match. For example, when a user searches for products for possible purchase, Google presents the user with Google Product Search links front-and- center, a premium placement no other product search service can obtain. Furthermore, Google Product Search shows prices and im- ages, where competitors get just text links. Meanwhile, a user † Associate Professor of Business Administration, Harvard Business School. * Professor, George Mason University School of Law and Department of Economics. Orig- inals at www.acslaw.org/acsblog/all/edelman-wright-debate-on-antitrust-scrutiny-of-goo gle (Oct. 3-7, 2011; vis. July 5, 2012). Each of the four main posts (they are presented here in chronological order) begins as follows: Editor’s Note: This is the first [or second or third or final] post in an ACSblog debate on antitrust scrutiny of Google between Harvard Business School Professor Benjamin G. Edel- man and George Mason University School of Law Professor Joshua D. Wright. This online debate follows a recent U.S. Senate hearing [www.acslaw.org/acsblog/senate-antitrus t-hearing-to-examine-google-practices] on whether Google’s business practices “serve consumers” or “threaten competition.” Comments on a post are reproduced after the end of that post.
    [Show full text]
  • Show Me Your Cookie and I Will Tell You Who You Are
    Show Me Your Cookie And I Will Tell You Who You Are Vincent Toubiana Vincent Verdot Alcatel-Lucent Bell Labs — Application Domain Route de Villejust, 91620 Nozay, France [lastname.firstname]@alcatel-lucent.com ABSTRACT i.e. unprotected. Furthermore, this cookie is sent when- With the success of Web applications, most of our data is ever the user accesses to a service hosted on google.com, now stored on various third-party servers where they are pro- increasing attack opportunities. In this paper we show how cessed to deliver personalized services. Naturally we must the sid cookie could be misused by an attacker, providing be authenticated to access this personal information, but ungranted access to Google Search personalized results and the use of personalized services only restricted by identifi- history. cation could indirectly and silently leak sensitive data. We We study an information leakage attack that exploits analyzed Google Web Search access mechanisms and found the current Google's access policy regarding personalized that the current policy applied to session cookies could be services (i.e. unauthenticated access). More specifically, used to retrieve users' personal data. We describe an at- we hijack a sid cookie to circumvent Google protection and tack scheme leveraging the search personalization (based on access a user's personal data who | possibly forced by the the same sid cookie) to retrieve a part of the victim's click attacker | transmitted her cookie in clear text. We empha- history and even some of her contacts. We implemented a size the risk of using unauthenticated personalized services proof of concept of this attack on Firefox and Chrome Web over a shared network with the following contributions.
    [Show full text]